CVE-2023-2987

CRITICAL

Wordapp < 1.5.0 - Data Authenticity Bypass

Title source: rule
STIX 2.1

Description

The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.

Scores

CVSS v3 9.8
EPSS 0.0017
EPSS Percentile 38.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-345
Status published
Products (2)
wordapp/wordapp < 1.5.0
wordapp/Wordapp < 1.6.0
Published May 31, 2023
Tracked Since Feb 18, 2026